Scholarly Works, Business Information Technology
Permanent URI for this collection
Research articles, presentations, and other scholarship
Browse
Browsing Scholarly Works, Business Information Technology by Subject "AACSB Table 1 Scholar Contribution"
Now showing 1 - 5 of 5
Results Per Page
Sort Options
- The Adaptive Roles of Positive and Negative Emotions in Organizational Insiders’ Security-Based Precaution TakingBurns, A. J.; Roberts, Tom L.; Posey, Clay; Lowry, Paul Benjamin (Institute for Operations Research and the Management Sciences (INFORMS), 2019-12)Protecting organizational information is a top priority for most firms. This reality, coupled with the fact that organizational insiders control much of their organizations’ valuable information, has led both researchers and practitioners to acknowledge the importance of insiders’ behavior for information security (InfoSec). Until recently, researchers have employed only a few theories to understand these influences, and this has generated calls for a broadened theoretical repertoire. Given this opportunity, we incorporate the framework of emotions developed in the information systems (IS) discipline by Beaudry and Pinsonneault (2010) and add the broaden-and-build theory (BBT) to understand the influence of discrete positive and negative emotions on insiders’ precaution-taking activities. Our findings demonstrate that the relationship between both positive and negative emotions and precaution taking is mediated by insiders’ (1) psychological capital (PsyCap), a higher-order, work-related construct of positive psychological resource capabilities, and (2) psychological distancing, a coping mechanism characterized by insiders’ attempts to detach themselves psychologically from a situation. By considering these factors, our model explains 32 percent of the variance in insiders’ precaution taking in organizations. Researchers and practitioners can use these findings to develop effective insider InfoSec training, including emotional appeals that increase insiders’ precaution taking.
- The Mediating Role of Group Dynamics in Shaping Received Social Support from Active and Passive Use in Online Health CommunitiesJames, Tabitha L.; Calderon, Eduardo D.; Belanger, France; Lowry, Paul Benjamin (Elsevier, 2022-04-01)Exchanging social support on online health communities (OHCs) can be beneficial to people's health, but the OHC characteristics that promote environments in which users feel socially supported are understudied. We develop a model that examines the mediating influence of OHC cohesiveness, altruism, and universality on the relationships between active and passive use and received OHC social support. Our findings indicate that social support can be derived from both active and passive use of the OHC. Although active use can directly stimulate received OHC social support, the relationship between passive use and social support is fully mediated by OHC group dynamics.
- The Product Test Scheduling ProblemRagsdale, Cliff T.; Martin, Megan; Fico, John; Cajica-Sierra, Carlos; Fetcenko, Richard (2022)
- Prominence and Engagement: Different Mechanisms Regulating Continuance and Contribution in Online CommunitiesKuem, Jungwon; Khansa, Lara Z.; Kim, Sung (2019-09-26)Online communities have suffered from their members’ intermittent, dormant, or nonexistent participation. We propose that prominence, which refers to the salience of community members’ psychological proximity to their community, differs from the engagement construct, which denotes a psychological dedication to behave prosaically toward other community members. Whereas engagement has been increasingly examined as a driver of online community behavior, the role of prominence has received a minimal amount of attention in the literature. Drawing on self-determination theory, we developed a framework that proposes the prominence construct as a phenomenon distinctive from engagement in its nature, formation, and behavioral outcomes. Our findings based on two studies indicate that the proposed model with prominence performs considerably better than the existing model with only engagement. Our conceptual model contributes to Information Systems research by laying a strong theoretical foundation to differentiate between the behavioral paths of the autonomous prominence construct and its controlled engagement counterpart.
- Stock market reactions to favorable and unfavorable information security events: A systematic literature reviewAli, Syed Emad Azhar; Lai, Fong-Woon; Dominic, P. D. D.; Brown, Nicholas James; Lowry, Paul Benjamin; Ali, Rao Faizan (Elsevier, 2021-11-01)The rapid digital transformations across every industry sector, accelerated partly due to the COVID-19 pandemic, have increased organizations’ use of information systems for operational and strategic purposes. These organizational responses have led to a confluence of digital, biological, and physical technologies that are revolutionizing business practices and workflows. But accompanying the pervasive use of digital technologies and the evolutionary nature of digital assets, is a shifting world of cyberattacks and information security (ISec) cybercrimes. Dynamic cybercrimes make it increasingly difficult for managers and researchers to anticipate the types, magnitude, and severity of future information security (ISec) breaches. Thus, we perform a systematic literature review (SLR) that explores, gathers, and categorizes event studies to examine the influence of favorable and unfavorable ISec events on stock markets. We extend the research conducted by Spanos and Angelis (2016) and provide a comprehensive understanding of the market's efficiency to process public information released about ISec events, ISec contingency factors, and the influence of ISec events on stock prices and factors other than price. Our systematic search reveals 58 relevant papers that include 80 studies. We find that in 75% of the studies ISec events can significantly affect a company's stock market performance, and that such effects are primarily exhibited within two days before and after the event day. Further, the magnitude of abnormal returns is higher in studies examining unfavorable ISec events, such as ISec breaches, compared to abnormal returns from favorable events, such as ISec investments and ISec certifications. In the end, our SLR serves as a foundation for ISec and management communities to build upon to keep industry and academia apprised of continually developing trends, new attack vectors and types of data breaches, protective ISec behaviors and programs, and their subsequent influences on stock market values and returns.